Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To impro...
详细信息
Protecting the security of sensitive information has become a matter of great concern to everyone. Data hiding technique solves the problem to some extent, but still, some shortcomings remain for researching. To improve the capability of hiding huge data file in disk with high efficiency. In this paper, we propose a novel approach called CryptFS, which is achieved by utilizing the file access mechanism and modifying the cluster chain structure to hide data. CryptFS can quickly hide data file with G bytes size in less than 0.1s. The time used for hiding and recovering data is irrelevant to the size of data file, and the reliability of the hidden file is high, which will not be overlaid by new created file and disk defragment.
This paper addresses detecting taint-style Thisvulnerabilities in PHP code. It extends classical taint-style model with an element called "cleans", which is used to specify sanitation routines. Based on the ...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
This paper addresses detecting taint-style Thisvulnerabilities in PHP code. It extends classical taint-style model with an element called "cleans", which is used to specify sanitation routines. Based on the new model, a static backward taint data analysis method is proposed to detecting taint-style vulnerabilities. This method includes four key steps, first of which is collecting sinks and constructing contexts, the second is backward tracing variables during a basic block, the third is tracing variables between blocks, and the last is tracing variables crossing function call. A tool called POSE implements this method and testing results show that the method is valid for detecting taint-style web application vulnerabilities.
With serious cybersecurity situations and frequent network attacks,the demands for automated pentests continue to increase,and the key issue lies in attack *** the limited viewpoint of the attacker,attack planning und...
详细信息
With serious cybersecurity situations and frequent network attacks,the demands for automated pentests continue to increase,and the key issue lies in attack *** the limited viewpoint of the attacker,attack planning under uncertainty is more suitable and practical for pentesting than is the traditional planning approach,but it also poses some *** address the efficiency problem in uncertainty planning,we propose the APU-D*Lite algorithm in this ***,the pentest framework is mapped to the planning problem with the Planning Domain Definition Language(PDDL).Next,we develop the pentest information graph to organize network information and assess relevant exploitation actions,which helps to simplify the problem ***,the APU-D*Lite algorithm is introduced based on the idea of incremental heuristic *** method plans for both hosts and actions,which meets the requirements of *** the pentest information graph as the input,the output is an alternating host and action *** experiments,we use the attack success rate to represent the uncertainty level of the *** result shows that APU-D*Lite displays better reliability and efficiency than classical planning algorithms at different attack success rates.
JavaScript engine is the core component of web browsers, whose security issues are one of the critical aspects of the overall Web Eco-Security. Fuzzing technology, as an efficient software testing approach, has been w...
详细信息
The ever-increasing need for high performance in scientific computation and engineering applications will push high-perfornlance computing beyond the exascale. As an integral part of a supercomputing system, high- per...
详细信息
The ever-increasing need for high performance in scientific computation and engineering applications will push high-perfornlance computing beyond the exascale. As an integral part of a supercomputing system, high- performance processors and their architecture designs are crucial in improving system performance. In this paper, three architecture design goals for high-performance processors beyond the *** are introduced, including effective performance scaling, efficient resource utilization, and adaptation to diverse applications. Then a high-performance many-core processor architecture with scalar processing and application-specific acceleration (Massa) is proposed, which aims to achieve the above three goals by employing the techniques of distributed computational resources and application-customized hardware. Finally, some future research directions regarding the Massa architecture are discussed.
Targeted at the situation of rampant attack on UEFI Platform Firmware, this paper systematically analyzes the Security mechanisms of UEFI platform firmware. Then the vulnerability factors of UEFI firmware are describe...
详细信息
Graph matching has a wide range of applications. However, graph matching faces two challenges: high computational complexity and loss information of graph embedded. In order to solve these two problems and correctly i...
详细信息
Knowledge graph representation learning provides a lot of help for subsequent tasks such as knowledge graph completion, information retrieval, and intelligent question answering. By representing the knowledge graph as...
详细信息
A major user need is the completion of security audits by locating vulnerability functions using vulnerability information published by firmware manufacturers. However, it is difficult to manually analyze the relative...
详细信息
With the rapid development of computer technology and the iteration of malware, numerous computer malware detection methods have been proposed, among which malware detection based on machine learning has become an imp...
详细信息
暂无评论